Hi [[ session.user.profile.firstName ]]

Data Theft in the 21st Century: Detect and Block PII & PEI Theft

Cybersecurity expert Jay Beale will provide a State of the Industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information).

Join this presentation and learn about the recent thefts and the methods of detecting and blocking them.
Recorded Sep 8 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jay Beale, COO at InGuardians
Presentation preview: Data Theft in the 21st Century: Detect and Block PII & PEI Theft

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Your Life Is The Attack Surface: The Risks of IoT in 2016 Recorded: Oct 12 2016 35 mins
    Jason Haddix, Head of Trust and Security at Bugcrowd
    The unprecedented growth and adoption of connected devices has created innumerable new threats for organizations, manufacturers and consumers, while at the same time creating unprecedented opportunities for hackers.

    In this webcast, join well known hacker and bug hunting advocate Jason Haddix, as he analyzes the evolution of IoT security and the mistakes and developments that have led us to where we are today. With experience working to attack and defend IoT applications, Haddix will explore what it takes to effectively hack connected devices, and how the role of defenders has evolved in this space.
  • Smartphone Encryption Is Getting Stronger. Is It Enough To Keep You Safe? Recorded: Oct 6 2016 43 mins
    Heather Mahalik, Principal Forensic Scientist at ManTech CARD
    As smartphones become more secure, what has changed for us forensically? What are the different types of security measures being deployed and how do these affect our processes? Which acquisition methods are best for secured devices? If you get an image of the device, can your current forensic methods provide you access for analysis? And most of all, will these security mechanisms keep your private data safe?

    This presentation will go into detail on each of these topics and dive into ways around some of these security features on smartphones. White papers, tools (including open source) and methods written and developed by those in our community will be discussed. Don't let a smartphone "out smart" you - take the reigns of your investigation.
  • Data Theft in the 21st Century: Detect and Block PII & PEI Theft Recorded: Sep 8 2016 49 mins
    Jay Beale, COO at InGuardians
    Cybersecurity expert Jay Beale will provide a State of the Industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information).

    Join this presentation and learn about the recent thefts and the methods of detecting and blocking them.
  • Shut the Traps: Take the Win out of Recon for an Attacker Recorded: Sep 7 2016 44 mins
    Alissa Torres, Senior Security Consultant at Sibertor Forensics
    By the time sophisticated cyber criminals gain access to your network, they may already possess incredible insight into the culture, infrastructure, security and day-to-day operations of your company. How are they able to obtain such information? Reconnaissance is the FIRST stage in remote exploitation performed in a targeted attack and can take place over a period of days, weeks or even years prior to the attacker ever delivering his first phishing email. Just what sensitive information has your company, your employees, your vendors or your customers made publicly available, either knowingly or inadvertently? Though a tweet or social media post may be harmless on its own, in aggregate, a company may suffer a weakened security posture if details such as key individuals, sensitive projects, financial projections and internal politics are disclosed in a public forum.This talk will focus on ways you can access and reduce your online disclosures. Take the "win" out of reconnaissance for the attacker by cutting off his pre-attack intelligence sources.
  • DevOps, Security and PCI - Implementing SCM To Meet PCI Standards Recorded: Sep 7 2016 49 mins
    Kevin Eberman, Director of Operations at MineralTree
    Security failures with millions of stolen credit cards have become an all too normal part of the news. The Payment Card Industry (PCI) has issued a standard for companies and service providers for handling credit cards to mitigate the risk of these breaches. Implementing a PCI certified environment requires a coordinated and sustained commitment to security by adopting policies, writing procedures, and an ability to successfully demonstrate compliance during audits.

    A number of PCI standards require the implementation of Server Configuration Management (SCM). SCM is an integral tool of DevOps. It is invaluable for meeting PCI requirements that are technical and need documentation. This discussion will review security challenges, which PCI requirements can be met with SCM and how to successfully implement SCM to meet PCI standards.
  • “If I Wake Evil” - How I Would Attack You If I Turned into a Criminal Mastermind Recorded: Sep 7 2016 47 mins
    John Strand, Owner of Black Hills Information Security
    What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
    How would I do it? Could you catch me? How can you stop me?

    Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
  • Mapping the CYBERscape: Advanced Threat Detection within the Security Ecosystem Recorded: Sep 6 2016 64 mins
    Eric McAlpine, Founder & Managing Partner at Momentum Partners and Luis Maldonado, VP of Products at Sqrrl
    Learn about the current state of the cybersecurity landscape and how various solutions, like threat hunting platforms, fit into an effective security ecosystem.

    In this webinar you will learn:
    - The current state of the cybersecurity market
    - What is the CYBERscape: a useful tool to make sense of an increasingly complex cybersecurity ecosystem
    - A breakdown of the advanced threat detection vendor category and how it continues to evolve
    - Solutions to leverage to complement your existing security ecosystem
  • Using Automation & Orchestration to Strengthen Network Security & Fight Hackers Recorded: Sep 6 2016 49 mins
    Sourabh Satish, Co-Founder & CTO at Phantom Cyber
    Limited resources, increased threat surface and incidents, and the overwhelming complexity of technology infrastructures, have made securing the organization more challenging than ever. Learn how security automation and orchestration is helping to address advanced threats, new vulnerabilities, hackers, zero day attacks, vulnerable apps and all the other elements that threaten your organization's network.
  • From Passive to Aggressive: Taking a Surgical Approach to Security Operations Recorded: Sep 6 2016 22 mins
    Rebekah Wilke, V-SOC Manager at Raytheon Foreground Security
    For too long, the conventional approach to information security has been to plant people at consoles and have them passively wait for an alarm. When an alert goes off, they are supposed to react and stop the attack. Whether this is done internally or through a managed security provider, the end result is the same – a passive approach to security. Enter V-SOC. A proactive, intelligence-driven and customized approach, specializing in innovations encompassing all flavors of customer engagements and service delivery. Join this presentations and learn:
    - How to be proactive in your approach to security operations
    - How to engage with an MSSP
    - Why you must automate wherever possible
  • Using Endpoints to Accelerate Threat Detection, Protection and Response Recorded: Aug 10 2016 45 mins
    Simon Crosby, CTO at Bromium
    Distributed, automated detection and protection accelerates breach response.

    Sadly more than 90% of breaches start with a “click”: Attachments, downloads, malvertising, Java, the web, media, USB and executables all punch holes in the perimeter. Conventional “detect to protect” tools fail – because 99% of malware morphs in under a minute, making signatures useless. And the thousand-fold increase in crypto-malware signals a shift to machine-timescale breaches that can bring an organization to its knees before the first alert. CISOs find themselves in the awful position of having to detect a breach once an attacker has succeeded – without knowing what to look for or how to respond.

    In an era of targeted and machine-timescale attacks, luck and hope are not enough. This talk will present a way to use the endpoints themselves to accelerate enterprise detection, threat analysis and response. The approach relies on the use of virtualization based security on endpoints to isolate threat vectors, protecting the endpoint but more importantly providing an isolated environment in which malware will execute, with the advantage of tamper-proof monitoring. Insights from each endpoint are correlated to accelerate enterprise-wide response.
Protect, Detect & Respond
Discover the latest trends in cyberattacks, threats and vulnerability risks, as well as the tools and techniques threat hunters use to protect, detect, and respond to attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Theft in the 21st Century: Detect and Block PII & PEI Theft
  • Live at: Sep 8 2016 6:00 pm
  • Presented by: Jay Beale, COO at InGuardians
  • From:
Your email has been sent.
or close